Internal Cyber Investigation Prior to beginning work on this ass...

Question
Internal Cyber Investigation

Prior to beginning work on this assignment, review the CRJ626 Unusual VPN Activity Scenario as well as the CyberNav Privacy and Security Policy. You must support your statements throughout the paper with evidence from a minimum of 10 scholarly or professional sources in addition to your text. For your paper, please consider the following problems related to the case study and policy documents:

Problem One: Determining if nefarious activity has indeed occurred.

Analyze the technical aspects pertinent to the scenario.

Explain a minimum of three methods that would assist the security personnel and information technology specialists to detect if a cybercrime has been committed.

Problem Two: Gathering necessary forensic evidence.

Examine methods of retrieving and analyzing data from the internal network in order to gather necessary information that might assist in the prosecution of any responsible parties.

Problem Three: Determining if an individual external or internal to the company caused the unusual VPN activity.

Evaluate legal issues that might arise in detecting cyber crimes committed by individuals external to the company.

Explain how the current policy addresses potential infractions by company employees.

Once you have addressed the identified problems noted above, review the CyberNav Privacy and Security Policy and draft suggested revisions to sections of the policy that will specifically address the issues presented in the CRJ626 Unusual VPN Activity Scenario.

The Internal Cyber Investigation paper

Must be 12 spaced pages (3,000 to 3,750 words) in length (not including title and references pages) and formatted according to APA style.

Must include a separate title page with the following:

Title of paper

Student’s name

Course name and number

Instructor’s name

Date submitted

Must use a minimum of 10 scholarly or professional sources in addition to the course text.

Must document all sources in APA style.

Must include a separate references page that is formatted according to APA style.
Solution Preview

These solutions may offer step-by-step problem-solving explanations or good writing examples that include modern styles of formatting and construction of bibliographies out of text citations and references.
Students may use these solutions for personal skill-building and practice.
Unethical use is strictly forbidden.

Problem One: Determining if nefarious activity has indeed occurred

In the CyberNav scenario, a set of technical aspects are highlighted. One of the most important is unauthorized access or hacking. Just as it is revealed in the case study, access necessarily means gaining entry into, communicating or instructing with the arithmetical, logical, or memory function resources of a computer system. Even though the employees at CyberNav have been permitted to access the sensitive information, it is only when they are within the organization. However, it is indicated that some of them are accessing the sensitive data remotely and this makes their access unauthorized.

A further technical aspect involved is confidentiality. Apparently, CyberNav is a custodian of top-secret industrial information. Such information, as profiled by Holt, Bossler, and Seigfried-Spellar (2015), is highly pertinent and should be safeguarded against illegal access. CyberNav ensures the safety of this information by making it available only through VPN. A further technical aspect of the scenario is an attack on a network system. The aspect is evidenced by the unusual computer traffic occurring through the VPN connection. It is through the network that CyberNav usually communicates with relevant personnel, who are the employees in this case, but some workers, and possibly outsiders, are taking undue advantage.

The security staff and information technology experts could use several methods to identify whether cybercrime has been perpetrated in the scenario under question. One of the most productive models is to collect security logs and analyze them for abnormal or suspicious activities. As informed by Yen, Oprea, Onarlioglu, Leetham, Robertson, Juels, and Kirda (2013), this action plan calls on the security personnel to look for credential logins or even application executions on the VPN. With this, it follows that the precise time in which access to the VPN-protected materials was done will be effectively determined. Hence, the security personnel will know whether there was access to sensitive and confidential information during non-business hours.
At the same time, collecting and analyzing the log files will allow the security personnel to know the IP address of the devices from which the remote access to confidential CyberNav information was initiated. If the IP address is tracked effectively, it is anticipated that the culprit will be identified more seamlessly.
This is only a preview of the solution.
Please use the purchase button to see the entire solution.
By purchasing this solution you'll be able to access the following files:
Solution.docx
Purchase Solution
$180.00
Google Pay
Amazon
Paypal
Mastercard
Visacard
Discover
Amex
View Available Law Tutors 645 tutors matched
Ionut
(ionut)
Master of Computer Science
Hi! MSc Applied Informatics & Computer Science Engineer. Practical experience in many CS & IT branches.Research work & homework
5/5 (6,808+ sessions)
1 hour avg response
$15-$50 hourly rate
Pranay
(math1983)
Doctor of Philosophy (PhD)
Ph.D. in mathematics and working as an Assistant Professor in University. I can provide help in mathematics, statistics and allied areas.
4.6/5 (6,701+ sessions)
1 hour avg response
$40-$50 hourly rate
Leo
(Leo)
Doctor of Philosophy (PhD)
Hi! I have been a professor in New York and taught in a math department and in an applied math department.
4.9/5 (6,469+ sessions)
2 hours avg response

Similar Homework Solutions